Description
Price: 15.00 USD | Size: 10.3 GB | Duration : 14+ Hours | 161 Video Lessons | Bonus : CISSP PDF Guides
BRAND: Expert TRAINING | ENGLISH | INSTANT DOWNLOAD | ⭐️⭐️⭐️⭐️⭐️ 5.0
This path prepares you to take the CISSP exam and covers all of the relevant topics, including the Common Body of Knowledge.
What you will learn
With this path, you’ll prepare to take the CISSP exam. You’ll review core relevant topics, including security and risk management, asset security, identity and access management, security operations, software development security and more. We conclude with helpful test-taking tips to prepare you for exam day.
Related job titles
You need five years of professional experience in the information security field to achieve the CISSP, but you can become an Associate of (ISC)² by passing the exam without experience.
This certification path is designed for:
- Cybersecurity managers
- Cybersecurity consultants
- Security architects
- Security engineers
- Anyone with a desire to earn one of the most in-demand security management certifications!
001 – Introduction to CISSP
002 – C-I-A
003 – Security Governance Fundamentals
005 – Regulatory Compliance
006 – Protecting Privacy
007 – Intellectual Property
008 – Import-Export
009 – Ethics
011 – Risk Definitions
012 – Risk Frameworks
013 – Risk Assessment
014 – Threats and Threat Agents
015 – Risk Assignment
017 – Security Awareness
018 – Due Diligence and Due Care
019 – Vendor Security
021 – Policy
022 – Personnel Security
023 – Control Frameworks
024 – SLAs
025 – Security Documents
027 – Managing Data
028 – Data Ownership
029 – Data Security Controls
030 – Data Remanence
031 – Data at Rest
032 – Data in Transit
033 – Classification
035 – Cryptography Terminology
036 – Hashing
037 – Cryptographic Attacks
038 – Symmetric Cryptography
039 – Asymmetric Cryptography
040 – Hybrid Cryptography
042 – Ciphers
043 – Digital Signatures
045 – PKI Definition and Components
046 – PKI Certificates
047 – Key Management
048 – Key Exchange
050 – Secure Design Principles
051 – Security Models Part 1
052 – Security Models Part 2
053 – Security Models Part 3
054 – Security Modes
055 – Evaluation Models
056 – Rainbow Series
057 – Common Criteria
058 – Certification and Accreditation
060 – TCB
061 – Computer Components
062 – Protection Mechanisms
063 – Common Architecture Flaws
064 – Web-Based Vulnerabilities
065 – Covert Channels
066 – Embedded Systems
068 – Facility Design
069 – Facility Construction
070 – Physical Security
071 – Perimeter Defenses
072 – Doors and Locks
073 – Internal Facilities Security
074 – Physical Intrusion Detection
075 – Personnel Safety
077 – Data Center Security
078 – Media Storage
079 – Utilities and HVAC
080 – Fire Safety
082 – Database Architectures
083 – Database Terminology
084 – Data Mining
085 – Transaction Management
086 – Database Attacks
088 – OSI Protocols
090 – OSI Layers
092 – TCPIP Model
093 – Network Devices
094 – Network Security
095 – IP Networking
097 – DNS and DHCP
098 – ARP
099 – Multi-layer Protocols
100 – Converged Protocols
101 – Network Cabling and Topology
102 – Signaling Types
103 – Network Attacks
104 – Switching
106 – Wireless Networks
107 – Mobile Systems
108 – WAN Technologies
109 – Remote Access
110 – Secure Communication Protocols
112 – Firewalls
113 – DMZ
114 – Honeypots
115 – Endpoint Security
116 – IDS
117 – Authentication Protocols
119 – VPN and VLAN
121 – Distributed and Cloud Computing
122 – Virtualization
123 – Virtualized Networks
125 – Access Control Basics
126 – Access Control Categories
127 – Authentication
129 – Account Management
130 – Single Sign-On (SSO)
132 – Identification
133 – Something You Know
134 – Something You Have
135 – Something You Are (Biometrics)
137 – Authorization
138 – Session Management and Accountability
139 – WLAN Authentication
140 – Remote Authentication Services
141 – Federated Identity
142 – Integrating Identity Services
143 – Access Control Models
144 – Access Control Techniques
145 – Access Control Administration
146 – Access Control Attacks
147 – Social Engineering
148 – Circumventing Access Controls
149 – Access Provisioning
151 – Security Assessment Goals
152 – Control Testing
153 – Penetration Testing
154 – Security Management Processes
156 – Computer Crime
157 – Investigations
158 – Forensics
159 – Evidence
161 – Log Management
162 – Egress Monitoring
163 – Configuration Management
164 – Operations Concepts
165 – Preventive Measures
166 – Trusted Recovery
167 – Patch & Vulnerability Management
169 – Business Continuity Planning
170 – Incident Response Plan
171 – Business Impact Analysis (BIA)
173 – Recovery Strategy
174 – Recovery Process
175 – Disaster Recovery Plan (DRP) Testing
176 – RAID
177 – Backups
178 – Network Redundancy
180 – Secure Software Design
181 – Secure SDLC
182 – Software Development Models
183 – Maturity Models
185 – Change Control
186 – Software Testing
187 – Software Environment
188 – Object-Oriented Programming (OOP)
189 – Distributed Computing
190 – Mobile Code
191 – Acquired Software
192 – Application Attacks
193 – Malware
Common Ports
Encryption
IPSec VPN
Notes on Biometrics
Notes on Access Control
Notes on IPv4-IPv6
Notes on Kerberos
OSI Model
Discover more from Easy Learning (Since 2013)
Subscribe to get the latest posts sent to your email.
Reviews
There are no reviews yet.